Javascript must be enabled to continue!
Identity Based Generalized Signcryption Scheme in the Standard Model
View through CrossRef
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model. To the best of our knowledge, it is the first scheme that is proven secure in the standard model.
Title: Identity Based Generalized Signcryption Scheme in the Standard Model
Description:
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm.
It is more suitable for the storage constrained setting.
In this paper, motivated by Paterson–Schuldt’s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model.
To the best of our knowledge, it is the first scheme that is proven secure in the standard model.
Related Results
MPKC-based Threshold Proxy Signcryption Scheme
MPKC-based Threshold Proxy Signcryption Scheme
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group sig...
Hybrid lightweight Signcryption scheme for IoT
Hybrid lightweight Signcryption scheme for IoT
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assur...
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing comp...
Establishment and Application of the Multi-Peak Forecasting Model
Establishment and Application of the Multi-Peak Forecasting Model
Abstract
After the development of the oil field, it is an important task to predict the production and the recoverable reserve opportunely by the production data....
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
Abstract
The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low tran...
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature func...
Novel/Old Generalized Multiplicative Zagreb Indices of Some Special Graphs
Novel/Old Generalized Multiplicative Zagreb Indices of Some Special Graphs
Topological descriptor is a fixed real number directly attached with the molecular graph to predict the physical and chemical properties of the chemical compound. Gutman and Trinaj...
Zheng Xiaoyun`s Theory of Cultural Identity
Zheng Xiaoyun`s Theory of Cultural Identity
This article is an analysis of the theory of cultural identity by Zheng Xiaoyun, a distinguished Chinese philosopher. His theory of cultural identity presented here gives a new per...

